Trains Are A Cyber Security Risk

Cyber security concerns are increasing along with political tensions, and because critical infrastructures might be at risk from cyber hacks.

So far, attacks used to be limited mainly to Distributed Denial-of-Service (DdoS) attacks that only cause short-term nuisance, but there is real damage that hackers could potentially cause to infrastructures, such as transportation.

Defense against cyber threats of critical infrastructure is now a very significant part of national security, since enemy nations can use ransomware or other types of threats to hack into important networks that are used for purposes like transportation.

The dramatic increase in such threats against rail systems has led to a rise of concern among cyber security experts.

Turns out that the ability to “hack a train” is more real than you think- modern trains and railways have complex digital systems for control and navigation, and everything that’s digital on them can also be hacked.

Malicious actors can disrupt the functioning of trains, ranging from stopping them or manipulating their speeds to sabotaging operations by tampering with railway switches or even causing intentional collisions.

North Korea has reportedly tried to hack South Korea’s rail transit systems and similarly, ransomware has been used to shutdown metro operations in Germany and San Francisco.

Rail systems can be vulnerable in the operations of the tracks which involve a complicated process, the ticketing systems could also be targeted or the safety features of the train can be compromised.

In October 2017, a DDoS attack hit Sweden's transportation network, crashing the system that monitors the trains’ locations, as well as taking down email systems, websites and road traffic maps. Passengers were unable to make reservations or receive updates regarding train status and delays.

More recently in 2022, there was a case in Denmark when trains were stopped for a couple of hours because a third-party IT service provider was hit by a ransomware attack.

The affected company provided a mobile application that train drivers used to access critical operational information, such as speed limits and information on work being done to the railroad.

And in 2022 a hacking group stopped trains in Belarus to disrupt Russia’s military build-up in Ukraine. The attack served a political purpose and attempted to disrupt military aggression.

However, the fact that hackers were able to access such critical infrastructure is a cause for concern.

There are two main threats to railways, the operational and the non-operational environments.

The non-operational environment affects railway companies’ data, which can be stolen and exploited. An example is an attack from April 2023 on the Alaska Railroad Corporation (ARRC), during which cyber criminals stole sensitive information about the company’s vendors and employees from its systems, and a similar case also occurred in the Netherlands in March.

When it comes to the operational environment, malicious actors can disrupt the functioning of trains, which can range from stopping them or manipulating their speeds to sabotaging operations by tampering with railway switches or even causing intentional collisions.

Another different cause for concern is physical ransomware attacks where malicious actors prevent trains from moving until their ransom demands are met.

Furthermore, trains are autonomous, which makes them vulnerable. Intercity trains have very long braking distances, sometimes up to one kilometer, therefore more complex solutions are needed for train safety because they are controlled wirelessly.

Across Europe, trains use standardised train operating systems which contribute to efficiency in the railway industry. The downside of this is that it opens the door for attackers to break into these systems on a wide scale.

Another risk factor is human error- train control systems are maintained by numerous people, which increases the risks of systems being insecurely connected to the Internet or employees using laptops infected with malware.

Trains, as opposed to other industries, have a very extensive lifespan and are expected to remain in service for around 30 years. Consequently, the train control systems currently in use were designed a decade or more ago.

Furthermore, train control systems include a complex system of various elements such as switches, light signals and other components. Maintaining it is challenging, mainly when the maintenance information is either outdated or it is unclear where it is stored.

Two possible solutions are a better and more extensive monitoring system, making sure to keep up to date with the risks of the time, and not getting complacent about the safety of older tech.

iHLS:     Cyber News:     Industrial Cyber:     DXC:     Standard:     Rail Journal:     Security Week

 

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« Software Faults Ground F-35 Warplanes
British Surveillance Laws: Apple Might Withdraw Services »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

Micro Focus

Micro Focus

Micro Focus is one of the world’s largest enterprise software providers. We deliver trusted and proven mission-critical software that keeps the digital world running.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

Mantix4

Mantix4

Mantix4’s M4 Cyber Threat Hunting Platform actively defends against cyber threats.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Cyber Tec Security

Cyber Tec Security

Cyber Tec Security is an IASME Certification Body for Cyber Essentials basic/Plus. We also provide ongoing Managed Security Services.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

Penten

Penten

Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence).

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Oregon Systems

Oregon Systems

Oregon Systems is a Regional Leader & Distributor with value added services for OT, IoT, IIoT & IT Cybersecurity products, Solutions & professional services throughout the middle-east region.

Cenobe Cyber Security

Cenobe Cyber Security

Cenobe provides customized solutions to keep you ahead of potential threats and ensure the security of your organization's systems and data.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.

XY Cyber

XY Cyber

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.

Armilla AI

Armilla AI

Armilla is the world’s only MGA focused solely on AI insurance and offers third-party testing, compliance, risk mitigation, and warranty coverage for enterprises and AI vendors alike.